How to make data encryption on a computer

Anonim

How to make data encryption on a computer

As you know, the owners of personal computers use the system for storing any data, whether something personal or working. That is why the overwhelming majority of people may be interested in the subject of data encryption, which implies setting some restrictions on access to files from unauthorized persons.

Further, in the course of the article, we will reveal the main features of data coding, as well as tell about special purpose programs.

Encryption data on a computer

First of all, such a detail is worthy as the relative simplicity of the process of protecting data on a computer running various operating systems. Mainly this applies to inexperienced users whose actions could entail consequences in the form of loss of access to data.

Encryption itself is a hide or movement of important data into the zone, inaccessible to other people. Typically, for these purposes, a special folder with a password that performs the role of temporary or permanent storage is created.

Adhere to the recommendations to subsequently avoid access to access.

As it is easy to guess, the TPM hardware module has its own partition with parameters in the Windows operating system.

  1. Open the Windows Search Window using the "Win + R" key.
  2. Successfully opened window to perform through a keyboard key in Windows WINTOVS

  3. In the "Open" text graph, insert a special command and click on the "OK" button.
  4. TPM.MSC.

    The process of starting the window with TPM parameters through the Run window in Windows Windows

  5. In the control window of the Trusted Platform Module (TPM), you can get a brief information about its work.
  6. Successfully open control window TPM platform module in WINTOVS

If the specified error you have not been seen, you can skip the following instructions for the settings, moving directly to the encryption process.

To get rid of the specified error, you must perform a number of additional actions associated with changing the local group policy of the computer. Immediately note that in the event of any unforeseen and not affected by us, you can roll back the system to an early state, using the functional "Restoration of the system".

Ability to transition to the system recovery system in the control panel in Windows WINTOVS

If everything was done correctly, you will find yourself in the "Local Group Policy Editor" window.

Successfully Open Local Group Policy Editor Window in Windows WINDOVS

  1. In the main list of folders in the Computer Configuration unit, deploy the child section "Administrative Templates".
  2. The process of disclosing the item administrative templates in the Group Policy Management window

  3. In the following list, expand the "Windows components" directory.
  4. Windows component disclosure process in the Group Policy Management window

  5. From a rather extensive list of folders in the disclosed section, find the "This policy parameter allows you to select BitLocker disk encryption."
  6. The process of disclosing the encryption control point in the Group Policy Management window

  7. Next, you need to select the "Operating System disks" folder.
  8. The process of disclosing the operating system drives folder in the Group Policy Management window

  9. In the main workspace, located on the right side of the block with the folder catalog, switch the viewing mode to the "standard".
  10. The process of switching the viewing mode to the standard in the Group Policy Management window

    This will allow you to search and edit the desired parameters with a slightly large convenience.

  11. In the documents submitted list, find and open the optional authentication section when starting.
  12. The process of moving to edit the parameter in the Group Policy Management window

  13. You can open the edit window as a double click LKM, and through the "Change" item in the PCM menu.
  14. Ability to go to edit the parameter in the Group Policy Management window

  15. At the top of the open window, find the parameter control unit and set the allocation opposite the option "Included".
  16. The process for enabling the parameter in the Group Policy Management window

  17. To further avoid possible complications, be sure to check the presence of a check mark in the "Parameters" window next to the paragraph specified in the screenshot.
  18. The process of incorporating additional parameters in the Group Policy Management window

  19. After completing the setting of recommended values ​​for Group Policy Settings, use the "OK" button at the bottom of the working window.
  20. The process of completing the activation of group policy parameters in Windows WINTOVS

Having done everything in accordance with our prescriptions, you will no longer encounter an error of the TPM platform module.

In order for the changes to enter into force, no reboot is required. However, if something went wrong with you, I had to restart the system.

Now, having understood with all the preparatory nuances, you can go directly to the protection of data on the disk.

  1. Go to the data encryption window in accordance with the first instruction in this method.
  2. BitLocker inclusion process through the control panel in Windows WINTOVS

  3. The desired window can also be opened from the system partition "My Computer" by clicking on the right disk with the right mouse button and selecting the "Enable BitLocker" item.
  4. The ability to enable BitLocker through the PCM menu in the My Computer window in Windows WINTOVS

  5. After successfully initializing the encryption process, the bitchker will automatically check the compatibility of the configuration of your computer.
  6. The process of checking the computer in the BitLocker Activation window in Windows WINTOVS

In the subsequent stage, you will need to select one of two encryption options.

The process of selecting a variety of encryption in the BitLocker activation window in Windows WINTOVS

  1. Optionally, you can create a password for subsequent access to information.
  2. Go to the encryption configuration using a password in the BitLocker activation window in Windows WINTOVS

  3. In the case of a password, you will need to enter any convenient set of characters in full compliance with the requirements of the system and click on the "Next" key.
  4. The ability to enter a password for a disk in the BitLocker activation window in Windows WINTOVS

  5. If you have a good USB drive, select "Insert USB Flash Memory Device.
  6. Go to the encryption configuration using USB in the BitLocker activation window in Windows WINTOVS

    Do not forget to connect your USB device to PC.

  7. In the list of available drives, select the desired device and use the "Save" button.
  8. USB selection process for disk encryption in the BitLocker Activation window in Windows WINTOVS

Whatever encryption method has been selected, you will find yourself on the key creation page with the key.

  1. Specify the most acceptable type of archive for you for storing the access key and click on the Next button.
  2. The process of configuring the archive for the key in the BitLocker activation window in Windows WINTOVS

    We use the key to save on the flash drive.

  3. Select the data encryption method on the disk, guided by the presented Bitokher Recommendations.
  4. The process of selecting the data encryption method in the BitLocker Activation window in Windows WINTOVS

  5. In the last step, set the box "Run the BitLocker scan" and use the "Continue" button.
  6. The beginning of the disk encryption in the BitLocker activation window in Windows WINTOVS

  7. Now in a special window, click the "Restart Now" key, do not forget to insert a flash drive with the encryption key.
  8. The process of rebooting the computer in the BitLocker activation window in Windows WINTOVS

From this point on, the automatic data encoding process on the selected disk will begin, the time of which directly depends on the configuration of the computer and some other criteria.

  • After a successful restart on the Windows taskbar, the data encoding service icon will appear.
  • Successfully working data encryption service on the toolbar in Windows WINTOVS

  • After clicking on the specified icon, a window will be presented with the possibility of transition to the BitLocker settings and a demonstration of information about the encryption process.
  • The process of encryption of the system disk via BitLocker in Windows WINTOVS

    During operation, the Bitquer creates a sufficiently strong load on the disk. It is most noticeable if the system partition is handling.

  • Throughout the coding, you can easily use the processed disc.
  • Ability to use an encrypted disk in the conductor in Windows WINTOVS

  • When the information security procedure is completed, a corresponding notification will appear.
  • Successfully completed BitLocker work in the Encryption window in Windows WINTOVS

  • You can temporarily abandon the protection of the disk by using a special point in the BitLocker control panel.
  • How to make data encryption on a computer 8231_33

    The performance of the protection system is resumed in automatic mode after turning off or restart your computer.

  • If necessary, changes can be paid to the beginning, using the "Disable BitLocker" item in the control panel.
  • Ability to disconnect the BitLocker in the control panel in Windows WINTOVS

  • Disconnection, as well as inclusion, does not impose on you any restrictions in working with PC.
  • Turning off the BitLocker in the control panel in Windows WINTOVS

  • The decoding may require more time than coding.
  • Disk decryption process in the BitLocker window in Windows WINTOVS

In the later stages of the encoding, the reboot of the operating system is not required.

Remember that now, when you have created some kind of protection of your personal data, you need to constantly use the available access key. In particular, this applies to the method using a USB drive to not meet with part-time difficulties.

READ ALSO: Folders do not open on the computer

Method 2: Sided Software

The second full-fledged method can actually be divided into many standards due to the existence of a huge number of different programs designed specifically to encrypt information on the computer. At the same time, as we have already mentioned at the very beginning, we revealed most of the software, but you can only decide on the application.

Please note that some high-quality programs are supplied by a paid license. But despite this, they have a fairly large number of alternatives.

The best, and that sometimes it is important, the most popular software for encryption is TrueCrypt. With this software, you can easily encode various information through the creation of special keys.

Process use of the program for encryption TrueCrypt

Another interesting program is R-Crypto, designed to encode data by creating containers. In such blocks, different information can be stored, it is possible to manage which is possible only if you have access keys.

Process use of the program for encryption R Crypto

The latter within this article, the software is RCF Encoder / Decoder, created in order to maximize the data encoding. Small weight of the program, a free license, as well as the ability to work without installation, are able to make this program indispensable for a regular PC user who is interested in protecting personal information.

Process Using a program for encryption RCF Encoder Decoder

Unlike the previously reviewed BitLocker functional, third-party software for encryption data allows you to encode only the information you need. In this case, the ability to restrict access to a whole disk also exists, but only in some programs, for example, TrueCrypt.

READ ALSO: Programs for encryption folders and files

It is worth drawing your attention to the fact that, as a rule, each application for encoding information on the computer has its own algorithm of relevant actions. Moreover, in some cases, the software has strict restrictions on the variety of protected files.

Compared to the same bit chiller, special programs cannot cause difficulties with access to data. If such difficulties still have arisen, we recommend that you familiarize yourself with the overview of the possibility of removing third-party software.

Delete a program by using Revo Uninstaller

See also: How to remove a failed program

Conclusion

At the end of this article, it is quite important to mention the need to save the access key after encryption. Since if this key is lost, you can lose access to important information or a whole hard disk.

In order not to be problems, use only reliable USB devices and follow the recommendations given along the job.

We hope you received answers to coding questions, and we end up the topic of data protection on the PC.

Read more